First published: Tue May 26 2015(Updated: )
CVE-2015-4050: ESI unauthorized access
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=2.3.19<2.3.29>=2.4.9<2.5.0>=2.5.4<2.5.12>=2.6.0<2.6.8 | |
composer/symfony/http-kernel | >=2.3.19<2.3.29>=2.4.9<2.5.0>=2.5.4<2.5.12>=2.6.0<2.6.8 | |
composer/symfony/http-kernel | >=2.4.9<=2.4.10 | |
composer/symfony/symfony | >=2.6.0<2.6.8 | 2.6.8 |
composer/symfony/symfony | >=2.5.4<2.5.12 | 2.5.12 |
composer/symfony/symfony | >=2.4.9<=2.4.10 | |
composer/symfony/symfony | >=2.3.19<2.3.29 | 2.3.29 |
composer/symfony/http-kernel | >=2.6.0<2.6.8 | 2.6.8 |
composer/symfony/http-kernel | >=2.5.4<2.5.12 | 2.5.12 |
composer/symfony/http-kernel | >=2.3.19<2.3.29 | 2.3.29 |
Symfony | =2.3.19 | |
Symfony | =2.3.20 | |
Symfony | =2.3.21 | |
Symfony | =2.3.22 | |
Symfony | =2.3.23 | |
Symfony | =2.3.24 | |
Symfony | =2.3.25 | |
Symfony | =2.3.26 | |
Symfony | =2.3.27 | |
Symfony | =2.3.28 | |
Symfony | =2.4.9 | |
Symfony | =2.4.10 | |
Symfony | =2.5.4 | |
Symfony | =2.5.5 | |
Symfony | =2.5.6 | |
Symfony | =2.5.7 | |
Symfony | =2.5.8 | |
Symfony | =2.5.9 | |
Symfony | =2.5.10 | |
Symfony | =2.5.11 | |
Symfony | =2.6.0 | |
Symfony | =2.6.1 | |
Symfony | =2.6.3 | |
Symfony | =2.6.4 | |
Symfony | =2.6.5 | |
Symfony | =2.6.6 | |
Symfony | =2.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4050 has a medium severity level as it allows unauthorized access to some fragments when ESI or SSI support is enabled.
To fix CVE-2015-4050, upgrade to Symfony versions 2.3.29, 2.5.12, 2.6.8 or later.
CVE-2015-4050 affects Symfony versions from 2.3.19 to 2.6.7, specifically 2.3.x, 2.4.x, 2.5.x, and 2.6.x series.
CVE-2015-4050 could potentially allow remote attackers to execute unauthorized code under certain configurations.
While CVE-2015-4050 does not directly involve web application firewalls, implementing such a firewall can help mitigate its impact.